Threats to Data and Information Flashcards
any potential danger to information or systems.
threat
subject to serious threats that can have adverse effects on organizational operations (including missions, functions, image, or reputation), organizational assets, individuals, other organizations, and the government by compromising the confidentiality, integrity, or availability of information being processed, stored, or transmitted by those systems.
information systems
Threats to information systems include
environmental disruptions,
human errors
purposeful attacks.
Additional threats arise in the
system acquisition and code distribution processes
Serious security problems have also resulted from
discarded or stolen systems
It refers to the capability of an adversary coupled with his/her intentions to undertake any actions detrimental to the success of program activities or operations.
threat
It is a natural or man-made occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property.
threat
It is a potential cause of an unwanted incident, which may result in harm to a system or organization.
threat
It refers to any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification of data, and/or denial of service.
security
It is also any circumstance or event with the potential to adversely impact agency operations (including mission, functions, image, or reputation), agency assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service
security
It also refers any circumstance or event with the potential to adversely impact organizational operations, organizational assets, individuals, other organizations, or the Nation through a system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
security
it also refers to any circumstance or event with the potential to intentionally or unintentionally exploit one or more vulnerabilities in a system resulting in a loss of confidentiality, integrity, or availability.
security
It is a potential cause of an incident, that may result in harm of systems and organization.
security
It is a potential undesirable event, malicious or not, of:
compromise
corruption
denial of service
e., theft of valuable or sensitive information or services),
compromise
degradation/blocking of data, processing, or communications or an entity possessing the capability and intent to cause the above.
denial of service
It is any circumstance or event with the potential to adversely impact the essential clinical performance of the device, organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, or other organizations through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
medical device
Threats exercise vulnerabilities, which may impact the essential clinical performance of the device.
medical device
It is an intentional or unintentional potential event that could compromise the security and integrity of the system.
biometrics
measurement and statistical analysis of people’s unique physical and behavioral characteristics.
biometrics
Threats are implemented by
threat agents
It is also called a threat actor.
threat agent
It refers to any person or thing that acts (or has the power to act) to cause, carry, transmit, or support a threat.
threat agent
It also refers to an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
threat agent